Privacy and Security: Lessons from Non-Health Sectors Professor Peter P. Swire Moritz College of Law The Ohio State University HIPAA Summit December 12,

Slides:



Advertisements
Similar presentations
Why the Financial Privacy Law is Better than People Think Professor Peter P. Swire Ohio State University University of Minnesota Symposium February 9,
Advertisements

Medical Privacy in a Broader Privacy Context Professor Peter P. Swire George Washington Law School Former Chief Counselor for Privacy, U.S. Govt. HIPAA.
The United States, Privacy, and Data Protection Peter P. Swire Dutch Embassy Presentation January 19, 2001.
Privacy and the Internet Professor Peter P. Swire Ohio State University National Press Foundation February 14, 2001.
The Chief Privacy Officer for the U.S. Government Professor Peter P. Swire Ohio State University Visiting, George Washington University Privacy Officers.
Reflections on the White House Privacy Office Peter P. Swire U.S. Chief Counselor for Privacy, OSU College of Law, 2001-present CFP, March 8,
HIPAA In Relation to Other Federal Laws Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP Glasser LegalWorks/HIPAA Conference.
"Embedding Privacy in Federal Information Systems" Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP MITRE Corp. Workshop.
Emerging Privacy and Security Issues for Healthcare Professor Peter P. Swire The Ohio State University Center for American Progress Sentrigo Webinar July.
Sharing of Medical Records Pursuant to an Authorization Professor Peter P. Swire Moritz College of Law, Ohio St. Univ. Consultant, Morrison & Foerster,
Privacy in America: Your Role as Guardians of the Publics Data Professor Peter P. Swire Moritz College of Law The Ohio State University Ohio Digital Government.
Privacy and the Use of Cost/Benefit Analysis Professor Peter Swire Ohio State University FTC Workshop on Information Flows June 18, 2003.
Data Breach as a Critical Infrastructure & Computer Security Issue Peter P. Swire Professor, The Ohio State University Senior Fellow, Center for American.
The Role of the Federal Government in Privacy Policy Professor Peter P. Swire The Ohio State University Center for American Progress The Privacy Symposium,
No Cop on the Beat: Underenforcement in E-Commerce and Cybercrime Peter P. Swire Ohio State University & Center for American Progress Fordham CLIP Information.
Trustwrap: The Importance of Legal Rules to E-Commerce and Internet Privacy Professor Peter P. Swire Moritz College of Law The Ohio State University Enforcing.
Mental Health Issues & Information Sharing Professor Peter P. Swire The Ohio State University NAAG Task Force on School Safety July 5, 2007.
Reflections on the White House Privacy Office Peter P. Swire Ohio State University Center for American Progress N.C. State Privacy Day January 29, 2008.
Security and Privacy in Electronic Health Records Peter P. Swire Ohio State University Consultant, Morrison & Foerster, LLP Hospital Wireless Conference.
The Need for Government-Wide Privacy Policy Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster, LLP DHS Privacy Advisory Committee.
The Strategy of Using Security to Protect Privacy Peter P. Swire Ohio State University Consultant, Morrison & Foerster, LLP Data Protection Commissioner.
National HIT Agenda and HIE John W. Loonsk, M.D. Director of Interoperability and Standards Office of the National Coordinator Department of Health.
Opportunities & Dangers: Consumers and Electronic Health Records Paul Feldman, Health Privacy Project Deven McGraw, National Partnership for Women & Families.
Engineers and Lawyers in Privacy Protection Peter Swire Professor, Moritz College of Law Visiting Professor, Georgia Institute of Technology IAPP Summit.
HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
Davis Wright Tremaine LLP Non-HIPAA Governmental Regulation of Healthcare Privacy and Security Sixteenth HIPAA Summit/The Privacy Symposium August 21,
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
Are you ready for HIPPO??? Welcome to HIPAA
Health IT Privacy and Security Policy Jodi Daniel, J.D., M.P.H. Director, Office of Policy and Research, Office of the National Coordinator for Health.
“Mortgages, Privacy, and Deidentified Data” Professor Peter Swire Ohio State University Center for American Progress Consumer Financial Protection Bureau.
Peter Swire Computing Community Consortium/CRA Workshop On Privacy By Design Berkeley February 6, 2015 Privacy by Design: More than Compliance with the.
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
Navigating Privacy and Security Issues for HIE: A Consumer Perspective Deven McGraw Chief Operating Officer National Partnership for Women & Families
HIPAA PRIVACY AND SECURITY AWARENESS.
Key Issues For Your Remaining HIPAA Compliance Time – The Health Plan Perspective Kimberly GrayKirk J. Nahra Chief Privacy OfficerWiley Rein & Fielding.
1 Health Information Security and Privacy Collaboration (HISPC) National Conference HISPC Contributions to Massachusetts HIE Privacy and Security Progress:
“How Broader Privacy Policy Issues Impact Healthcare” Professor Peter P. Swire Moritz College of Law The Ohio State University HIT Summit September 26,
How Can We Deal with Risks from the Internet: Why Privacy Legislation Is Hot Right Now Professor Peter Swire Ohio State University/Center for American.
Can We Have EHRs and Privacy Too? Dr. Alan F. Westin Professor of Public Law and Government Emeritus, Columbia University; Principal, Privacy Consulting.
Update on Federal HIT Legislation Kirsten Beronio Mental Health America.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
WEDI ICD-10 Update National Committee on Vital and Health Statistics Subcommittee on Standards June 10, 2014 Jim Daley, Chairman, WEDI Director, IT Risk.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Where Did HIPAA Come From? “HIPAA Then and Now” Peter Swire Georgia Tech Scheller College of Business Alston & Bird LLP IAPP-Las Vegas 2015.
PricewaterhouseCoopers 1 Administrative Simplification: Privacy Audioconference April 14, 2003 William R. Braithwaite, MD, PhD “Doctor HIPAA” HIPAA Today.
Policies for Information Sharing April 10, 2006 Mark Frisse, MD, MBA, MSc Marcy Wilder, JD Janlori Goldman, JD Joseph Heyman, MD.
EHealth Progress Across the States in 2007 Results of a Survey of State Officials AcademyHealth National Health Policy Conference State Health Research.
Student Financial Assistance. Session 55-2 Session 55 Internet Privacy Laws.
Overview of ONC Report to Congress on Health Information Blocking Presented to the Health IT Policy Committee, Task Force on Clinical, Technical, Organizational,
“Privacy and Security: Lessons from Non-Health Sectors” Professor Peter P. Swire Moritz College of Law The Ohio State University HIPAA Summit March 29,
Preparing to Implement HITECH A New Report from the State Alliance For E-Health Ree Sailors Kentucky e-Health Summit September 16, 2009.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Office of the Secretary Office for Civil Rights (OCR) Enforcement and Policy Challenges in Health Information Privacy Linda Sanches HIPAA Summit Special.
“Privacy and Security: Lessons from Non-Health Sectors” Professor Peter P. Swire Moritz College of Law The Ohio State University HIT Symposium at MIT July.
CIS 170 MART Teaching Effectively/cis170mart.com FOR MORE CLASSES VISIT HCA 497 MART Inspiring Minds/hca497mart.com FOR MORE CLASSES.
School of Health Sciences Unit 4 Legal Aspects of Health Information and Health Care Statistics HI 135 Instructor: Alisa Hayes, MSA, RHIA, CCRC.
HCA 497 MART Experience Tradition /hca497mart.com FOR MORE CLASSES VISIT
Health Insurance Portability and Accountability Act of 1996
“Privacy and Security: Lessons from Non-Health Sectors”
SHARING CLINICAL DATA: Legal and Privacy Issues
Concerns of a Privacy Advocate – and How to Respond
Healthcare Privacy: The Perspective of a Privacy Advocate
manatt | phelps | phillips
No Cop on the Beat: Underenforcement in E-Commerce and Cybercrime
Enforcement and Policy Challenges in Health Information Privacy
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Objectives Describe the purposes of the Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 Explore how the HITECH Act.
Managing Privacy Risk in Your Commercial Practices
Non-HIPAA Governmental Regulation of Healthcare Privacy and Security
Presentation transcript:

Privacy and Security: Lessons from Non-Health Sectors Professor Peter P. Swire Moritz College of Law The Ohio State University HIPAA Summit December 12, 2007

Overview My background My background Importance of privacy & security to deployment of health IT Importance of privacy & security to deployment of health IT Two key issues, informed by non-health experiences: Two key issues, informed by non-health experiences: Preemption Preemption Enforcement Enforcement Explain the consumer, industry, & political perspectives on these issues Explain the consumer, industry, & political perspectives on these issues Conclusion: the choice we face Conclusion: the choice we face

Swire Background Now law professor, based in D.C. Now law professor, based in D.C. Active in many privacy & security activities Active in many privacy & security activities Senior Fellow, Center for American Progress Senior Fellow, Center for American Progress Chief Counselor for Privacy, Chief Counselor for Privacy, U.S. Office of Management & Budget U.S. Office of Management & Budget WH coordinator, HIPAA privacy rule WH coordinator, HIPAA privacy rule Financial, Internet, government agency privacy Financial, Internet, government agency privacy National security & FISA National security & FISA Computer security Computer security

Background Health care since 2001: Health care since 2001: Written on health privacy & security topics, at Written on health privacy & security topics, at Consulted on HIPAA implementation and PHR providers Consulted on HIPAA implementation and PHR providers Markle, Connecting for Health Markle, Connecting for Health Deidentification White Paper Deidentification White Paper

One Current Healthcare Activity Advisor to new company Advisor to new company Hedgehog - Database Security from Sentrigo Hedgehog - Database Security from Sentrigo Addresses a major gap – protecting against insider misuse/access to databases Addresses a major gap – protecting against insider misuse/access to databases A next logical security step: A next logical security step: Protect against database breaches caused by insiders – free download, pay for enhanced Protect against database breaches caused by insiders – free download, pay for enhanced Logical next step in HIPAA security Logical next step in HIPAA security Assures partners, such as in NHIN, of internal safeguards Assures partners, such as in NHIN, of internal safeguards

Privacy, Security & the NHIN As public policy matter, crucial to get the benefits of data flows (electronic health records) while minimizing the risks (privacy and security) As public policy matter, crucial to get the benefits of data flows (electronic health records) while minimizing the risks (privacy and security) As political matter, privacy and security are the greatest obstacles to adoption As political matter, privacy and security are the greatest obstacles to adoption Focus group – the emergency room while out of town as the only scenario that got substantial majority to favor EHRs Focus group – the emergency room while out of town as the only scenario that got substantial majority to favor EHRs Many individuals see risks > rewards of EHRs Many individuals see risks > rewards of EHRs

Implications of Public Concern All those who support EHRs must have good answers to the privacy and security questions that will be posed at every step All those who support EHRs must have good answers to the privacy and security questions that will be posed at every step Trust us not likely to be a winning strategy Trust us not likely to be a winning strategy The need for demonstrable, effective protections The need for demonstrable, effective protections The system must be strong enough to survive the inevitable data breaches & resultant bad publicity The system must be strong enough to survive the inevitable data breaches & resultant bad publicity

Preemption Industry perspective: Industry perspective: Benefits of data sharing high – paper kills Benefits of data sharing high – paper kills Shift to electronic clinical records is inevitable; that shift has occurred in other sectors Shift to electronic clinical records is inevitable; that shift has occurred in other sectors Can only run a national system if have a national set of rules Can only run a national system if have a national set of rules Preemption is essential – a no brainer Preemption is essential – a no brainer

Preemption: Consumer View Janlori Goldman, Health Privacy Project Janlori Goldman, Health Privacy Project A lot of state privacy laws A lot of state privacy laws HIVHIV Other STDsOther STDs Mental health (beyond psychotherapy notes)Mental health (beyond psychotherapy notes) Substance abuse & alcoholSubstance abuse & alcohol Reproductive & contraceptive care (where states vary widely in policy)Reproductive & contraceptive care (where states vary widely in policy) Public health & other state agenciesPublic health & other state agencies HIPAA simply doesnt have provisions for these topics – if preempt, then big drop in privacy protection HIPAA simply doesnt have provisions for these topics – if preempt, then big drop in privacy protection

Consumers & Preemption Link of reporting and privacy Link of reporting and privacy HIV and other public health reporting based on privacy promises HIV and other public health reporting based on privacy promises So, objections if do reporting w/out privacy So, objections if do reporting w/out privacy Concrete problems of multi-state? Concrete problems of multi-state? Many RHIOs have only one or a few states Many RHIOs have only one or a few states Build out from there Build out from there State laws both as burdens (industry) and protections (consumers) State laws both as burdens (industry) and protections (consumers)

Preemption & Politics Consumer and privacy advocates see states as the engine for innovation Consumer and privacy advocates see states as the engine for innovation Current example: data breach Current example: data breach California went first, and now Congress is trying to catch up with a uniform standard California went first, and now Congress is trying to catch up with a uniform standard Basic political dynamic – industry gets preemption in exchange for raising standards nationally Basic political dynamic – industry gets preemption in exchange for raising standards nationally

Preemption in Other Sectors Gramm-Leach-Bliley: no preemption Gramm-Leach-Bliley: no preemption But, Fair Credit 2003 does some of that But, Fair Credit 2003 does some of that Wiretap (ECPA): no preemption Wiretap (ECPA): no preemption Data breach: proposed preemption Data breach: proposed preemption FTC unfair/deceptive enforcement: no preemption FTC unfair/deceptive enforcement: no preemption CAN-SPAM: significant preemption CAN-SPAM: significant preemption Conclusion -- variation Conclusion -- variation

Key Issues in Preemption Scope of preemption matters & can vary Scope of preemption matters & can vary One policy baseline: scope of preemption matches the scope of the federal regime One policy baseline: scope of preemption matches the scope of the federal regime If the scope is for networked health IT, then preemption about that, not entire health system If the scope is for networked health IT, then preemption about that, not entire health system Preserve state tort and contract law? Preserve state tort and contract law? Preserve state unfair & deceptive enforcement? Preserve state unfair & deceptive enforcement? Grandfather existing state laws? Some of them? Grandfather existing state laws? Some of them?

Summary on Preemption Strong pressures for preemption in national, networked system Strong pressures for preemption in national, networked system If simply preempt and apply HIPAA, then have a dramatic reduction in privacy & security If simply preempt and apply HIPAA, then have a dramatic reduction in privacy & security This is a major & complicated policy challenge that is not likely to have a simple outcome This is a major & complicated policy challenge that is not likely to have a simple outcome

Enforcement The critique here of enforcement: The critique here of enforcement: Critique of policies, not of the good faith of the individuals involved Critique of policies, not of the good faith of the individuals involved The current no enforcement system The current no enforcement system Key question for the NHIN: Key question for the NHIN: Can the current no-enforcement system be a credible basis for EHRs and the NHIN? Can the current no-enforcement system be a credible basis for EHRs and the NHIN?

The No Enforcement System Imagine some other area of law that you care about – violations are serious. Imagine some other area of law that you care about – violations are serious. Batting average: 0 enforcement actions for 25,000 complaints; > 4,100 violations Batting average: 0 enforcement actions for 25,000 complaints; > 4,100 violations Enforcement policy: one free violation Enforcement policy: one free violation Criminal enforcement: Criminal enforcement: DOJ cut back scope of criminal penalties DOJ cut back scope of criminal penalties No prosecution for the > 350 criminal referrals No prosecution for the > 350 criminal referrals Not even referred back to HHS Not even referred back to HHS 4 cases brought by local federal prosecutors 4 cases brought by local federal prosecutors

Effects of No Enforcement Signals work Signals work Surveys already showing lower efforts at HIPAA compliance and lower reported actual compliance by covered entities Surveys already showing lower efforts at HIPAA compliance and lower reported actual compliance by covered entities Contrast internal HIPAA efforts and budget (low enforcement) with compliance efforts on Medicare fraud & abuse (hi enforcement) Contrast internal HIPAA efforts and budget (low enforcement) with compliance efforts on Medicare fraud & abuse (hi enforcement) Why should Congress and consumer groups trust compliance with HIPAA, much less with new rules for the NHIN? Why should Congress and consumer groups trust compliance with HIPAA, much less with new rules for the NHIN? GAO Report, 2007, on lack of privacy in the NHIN GAO Report, 2007, on lack of privacy in the NHIN

Other Privacy Enforcement Fair Credit, stored communications, video rentals, cable TV Fair Credit, stored communications, video rentals, cable TV Federal plus private right of action Federal plus private right of action Deceptive practices, CAN-SPAM, COPPA, proposed data breach Deceptive practices, CAN-SPAM, COPPA, proposed data breach Federal, plus state AG Federal, plus state AG HIPAA as outlier, with federal-only enforcement HIPAA as outlier, with federal-only enforcement If feds dont do it, then have no enforcement of the HIPAA rules themselves If feds dont do it, then have no enforcement of the HIPAA rules themselves

What We Have Learned Within health IT debates, consensus statements often sound like this: Within health IT debates, consensus statements often sound like this: Need preemption to do the national network Need preemption to do the national network Should not punish/enforce against covered entities, when they are struggling in good faith to implement new HIPAA mandates Should not punish/enforce against covered entities, when they are struggling in good faith to implement new HIPAA mandates Of course, privacy and security should be part of the NHIN, but likely dont go beyond HIPAA requirements Of course, privacy and security should be part of the NHIN, but likely dont go beyond HIPAA requirements

What We Have Learned That trio of conclusions, based on experience in other sectors, may face serious political obstacles: That trio of conclusions, based on experience in other sectors, may face serious political obstacles: Preemption is likely to be partial and require new federal standards in some areas Preemption is likely to be partial and require new federal standards in some areas The no-enforcement system will be hard to sustain The no-enforcement system will be hard to sustain New privacy/security protections quite likely will accompany new NHIN data flows New privacy/security protections quite likely will accompany new NHIN data flows

Conclusion: Your Choice Option 1: Play Hardball Option 1: Play Hardball Decide the costs of privacy & security are too high to be built into the NHIN Decide the costs of privacy & security are too high to be built into the NHIN Push a strategy of high preemption and low enforcement Push a strategy of high preemption and low enforcement Grudgingly give only the bare minimum on privacy/security when the political system forces it onto industry Grudgingly give only the bare minimum on privacy/security when the political system forces it onto industry

The Better Choice Option 2: A NHIN to Be Proud Of Option 2: A NHIN to Be Proud Of Incorporate the key values of state laws – especially for sensitive data – into the NHIN Incorporate the key values of state laws – especially for sensitive data – into the NHIN Support reasonable enforcement, so that bad actors are deterred and good actors within covered entities get support Support reasonable enforcement, so that bad actors are deterred and good actors within covered entities get support Build privacy & security into the fabric of new systems, not just as a patch later Build privacy & security into the fabric of new systems, not just as a patch later Connecting for Health as an exampleConnecting for Health as an example

The Better Choice With the second option – A NHIN to Be Proud Of – the patients are not treated as the political enemies With the second option – A NHIN to Be Proud Of – the patients are not treated as the political enemies The risk of political backlash is less The risk of political backlash is less The quality of the NHIN for actual patients is higher The quality of the NHIN for actual patients is higher That, I think, should be our goal That, I think, should be our goal Thank you Thank you

Contact Information Phone: (240) Phone: (240) Web: Web: